SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks
@article{Zhang2016SeDSSD, title={SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks}, author={Aiqing Zhang and J. Chen and R. Hu and Y. Qian}, journal={IEEE Transactions on Vehicular Technology}, year={2016}, volume={65}, pages={2659-2672} }
Security and availability are two crucial issues in device-to-device (D2D) communication, with its fast development in fourth-generation (4G) Long-Term Evolution Advanced (LTE-Advanced) networks. In this paper, we propose a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communication. Specifically, a public-key-based digital signature, combined with a mutual authentication mechanism of a cellular… CONTINUE READING
Figures, Tables, and Topics from this paper
95 Citations
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
- Computer Science
- Mob. Networks Appl.
- 2017
- 26
- Highly Influenced
Flexible data access control in D2D communications
- Computer Science
- Future Gener. Comput. Syst.
- 2018
- 15
- PDF
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network
- Computer Science
- 2020
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks
- Computer Science
- 2019 IEEE Global Communications Conference (GLOBECOM)
- 2019
- 2
Secure content sharing protocol for D2D users based on profile matching in social networks
- Computer Science
- 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP)
- 2017
- 5
A Lightweight and Secure Data Sharing Protocol for D2D Communications
- Computer Science
- 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
- 2017
- Highly Influenced
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
- Computer Science
- IEEE Transactions on Wireless Communications
- 2020
References
SHOWING 1-10 OF 30 REFERENCES
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications
- Computer Science
- IEEE Transactions on Vehicular Technology
- 2007
- 819
- Highly Influential
- PDF
Noninteractive Pairwise Key Establishment for Sensor Networks
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2010
- 48
Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks
- Computer Science
- IEEE Journal on Selected Areas in Communications
- 2013
- 36
- Highly Influential
- PDF
Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks
- Computer Science
- IEEE Communications Letters
- 2013
- 130
Joint physical-application layer security for wireless multimedia delivery
- Computer Science
- IEEE Communications Magazine
- 2014
- 79
Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks
- Computer Science
- IEEE Transactions on Vehicular Technology
- 2012
- 57
- PDF
LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
- Computer Science
- IEEE Journal on Selected Areas in Communications
- 2013
- 31
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications
- Computer Science
- J. Inf. Sci. Eng.
- 2010
- 20
- PDF
Distributed Access Control with Privacy Support in Wireless Sensor Networks
- Computer Science
- IEEE Transactions on Wireless Communications
- 2011
- 85
- PDF